Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack s…
First seen on gbhackers.com
Jump to article: gbhackers.com/vulnerabilities-in-jpeg-2000-library/